Read Ahead | Cover6 Solutions Workshops
This guide prepares you for our #PentesterPrep & #SOCAnalystPrep
hands-on cybersecurity training.
First, we want to thank you for your interest in Cover6 Solutions. If you made it this far, that means you have most likely registered for one of our workshops. For that, we are forever grateful, and you will always be considered family to us.
This material summarizes the workshops, the hardware and software requirements, helpful videos, and education references to help you better understand the class content.
Use the tabs below to view the material for your desired workshop.
The #SOCAnalystPrep workshop is the defensive equivalent of the #PentesterPrep workshop. It prepares you to work in a Security Operations Center (SOC) immediately upon completion. For this class, you will need the following tools installed:
- Nessus Essentials
- Windows Sysinternals Suite
- Clicking this link starts the download of the SysinternalsSuite.zip file
- Kali Linux (Optional)
We DO NOT teach Kali Linux in this workshop. However, you will see offensive techniques used by the instructor to simulate attacker activity.
We will provide you access to the following online servers, so be sure to bookmark the following URLs:
Through real-world, hands-on instruction, and with a focus on network defense, we provide a path to a successful career as a Security Operations Center (SOC) Analyst. #SOCAnalystPrep.
Ever wondered what it is like to be on the front line of defense in the Cybersecurity industry? If so, you may be interested in becoming a Security Operations Center (SOC) Analyst.
SOC Analysts are highly sought-after individuals who identify compromised machines and malicious actors. These individuals utilize defensive security skills and techniques that are commonly used in the industry while working to mitigate any damages that may have occurred.
In this training, participants will oversee a network that is currently under attack. Our students will learn various strategies to help defend against several attack scenarios. A few of the tools and technologies that participants will explore include; Security Onion, Wireshark, Splunk, and Nessus. As a participant, we highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.
The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback, as well.
If you have any additional questions outside of the FAQs, please do not hesitate to reach out to firstname.lastname@example.org, and we will be happy to assist you.
Have you ever wanted to learn about what it takes to be a Penetration Tester? Does taking a hands-on practical exam make you nervous? We are here to help you get past that.
Over five weeks (every Tuesday from 6-9 PM ET), our hands-on “Live” workshop will provide what it takes to begin your journey as a successful #Pentester. Whether you are a beginner or a seasoned professional, this training will teach you offensive techniques to improve your pentesting skills all while making you a better defender.
Throughout the course, we will address and discuss various penetration testing topics, tools, technologies, and methodologies that are commonly used in the industry. By no means are the course and its objectives all-encompassing. As a participant, it is highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.
The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well.
If you have any additional questions outside of the FAQs, please do not hesitate to reach out to email@example.com and we will be happy to assist you.
This course is tailored to assist with the preparation for all offensive (practical) exams. It also includes the five primary exam objectives for the CompTIA Pentest+ Certification which are:
- Planning and Scoping
- Information Gathering and Vulnerability Identification
- Attacks and Exploits
- Penetration Testing Tools
- Reporting and Communication
Note: This is NOT an official CompTIA Training but but rather preparation for real scenarios you may encounter in pentesting engagements or on the Pentest+ exam. Various tools, techniques and procedures will be covered thus those listed are just examples and are not limited to only those, as material is subject to change.
Breaking into Cybersecurity w/ Tyrone E. Wilson
Home Lab Setup | Building an Effective Cybersecurity Learning Environment
Passive Information Gathering
Active Information Gathering
Understanding the Metasploit Database
Incident Handling & Threat Hunting w/ Security Onion: Gain Hands-On Cybersecurity Experience
IPv6 Enumeration & Attacks
Virtual Security Operations Center (SOC) Analyst Prep Workshop (Live) – FREE Session
You can check out the following references to gain familiarity with terms and topics you will hear in class.